all lists on lists.proxmox.com
 help / color / mirror / Atom feed
From: Thomas Lamprecht <t.lamprecht@proxmox.com>
To: Proxmox VE development discussion <pve-devel@lists.proxmox.com>,
	Fiona Ebner <f.ebner@proxmox.com>
Subject: Re: [pve-devel] [PATCH docs] pct: cgroup: update to cgroupv2 being the only supported mode
Date: Thu, 14 Aug 2025 15:34:25 +0200	[thread overview]
Message-ID: <7b993f96-6a67-4d05-a3a9-98a48b8c1966@proxmox.com> (raw)
In-Reply-To: <20250814115443.250599-1-f.ebner@proxmox.com>

On 14/08/2025 13:54, Fiona Ebner wrote:
> As already mentioned in the known issues in the roadmap [0], cgroupv2
> is the only supported mode in Proxmox VE 9.
> 
> [0]: https://pve.proxmox.com/wiki/Upgrade_from_8_to_9#cgroup_V1_Removal
> 
> Signed-off-by: Fiona Ebner <f.ebner@proxmox.com>
> ---
> 
> Didn't want to drop mentioning the differences etc. just yet, because
> some people were still running in legacy environments.
> 
>  pct.adoc | 39 ++++++++-------------------------------
>  1 file changed, 8 insertions(+), 31 deletions(-)
> 
> diff --git a/pct.adoc b/pct.adoc
> index 529b72f..00d6329 100644
> --- a/pct.adoc
> +++ b/pct.adoc
> @@ -672,17 +672,15 @@ The main resources controlled via 'cgroups' are CPU time, memory and swap
>  limits, and access to device nodes. 'cgroups' are also used to "freeze" a
>  container before taking snapshots.
>  
> -There are 2 versions of 'cgroups' currently available,
> -https://www.kernel.org/doc/html/v5.11/admin-guide/cgroup-v1/index.html[legacy]
> -and
> -https://www.kernel.org/doc/html/v5.11/admin-guide/cgroup-v2.html['cgroupv2'].
> +The current version of 'cgroups' is
> +https://www.kernel.org/doc/html/v6.14/admin-guide/cgroup-v2.html['cgroupv2'].
> +There also is a, now unsupported,

Would word that as:

"The https://www.kernel.org/doc/html/v6.14/admin-guide/cgroup-v1/index.html[v1 version] of the cgroup subsystem was deprecated with the release of Proxmox VE 7.0 and removed entirely with Proxmox VE 9.0."

> +https://www.kernel.org/doc/html/v6.14/admin-guide/cgroup-v1/index.html[legacy]
> +version.
>  
> -Since {pve} 7.0, the default is a pure 'cgroupv2' environment. Previously a
> -"hybrid" setup was used, where resource control was mainly done in 'cgroupv1'
> -with an additional 'cgroupv2' controller which could take over some subsystems
> -via the 'cgroup_no_v1' kernel command-line parameter. (See the
> -https://www.kernel.org/doc/html/latest/admin-guide/kernel-parameters.html[kernel
> -parameter documentation] for details.)
> +Since {pve} 7.0, the default is a pure 'cgroupv2' environment and since {pve}
> +9.0, this is the only supported mode. Before {pve} 7.0, a "hybrid" mode was the
> +default.
>  
>  [[pct_cgroup_compat]]
>  CGroup Version Compatibility
> @@ -720,29 +718,8 @@ environment, you can either
>  * Move the container, or its services, to a Virtual Machine. Virtual Machines
>    have a much less interaction with the host, that's why one can install
>    decades old OS versions just fine there.
> -
> -* Switch back to the legacy 'cgroup' controller. Note that while it can be a
> -  valid solution, it's not a permanent one. Starting from {pve} 9.0, the legacy
> -  controller will not be supported anymore.
>  ====
>  
> -[[pct_cgroup_change_version]]
> -Changing CGroup Version
> -^^^^^^^^^^^^^^^^^^^^^^^

Maybe it would be better to keep that in for now, it's often linked too in
the forum, so would be good to just explictily state here that this is not
possible anymore with Proxmox VE 9 or later.

Alternatively we could just keep the anchor and move it earlier in the text,
where it's stated that v1 isn't supported for PVE 9 at all, that way at least
the links would still work and give the user _some_ context.

> -
> -TIP: If file system quotas are not required and all containers support 'cgroupv2',
> -it is recommended to stick to the new default.
> -
> -To switch back to the previous version the following kernel command-line
> -parameter can be used:
> -
> -----
> -systemd.unified_cgroup_hierarchy=0
> -----
> -
> -See xref:sysboot_edit_kernel_cmdline[this section] on editing the kernel boot
> -command line on where to add the parameter.
> -
>  // TODO: seccomp a bit more.
>  // TODO: pve-lxc-syscalld
>  



_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel


  reply	other threads:[~2025-08-14 13:32 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-08-14 11:54 Fiona Ebner
2025-08-14 13:34 ` Thomas Lamprecht [this message]
2025-08-14 14:01   ` [pve-devel] superseded: " Fiona Ebner

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=7b993f96-6a67-4d05-a3a9-98a48b8c1966@proxmox.com \
    --to=t.lamprecht@proxmox.com \
    --cc=f.ebner@proxmox.com \
    --cc=pve-devel@lists.proxmox.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal